# https://syzkaller.appspot.com/bug?id=7e9fcb0736aaac1fc071ddbbb213f82e9a99df01 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{Threaded:true Collide:false Repeat:true Procs:8 Sandbox: Fault:false FaultCall:-1 FaultNth:0 EnableTun:false UseTmpDir:false HandleSegv:true WaitRepeat:true Debug:false Repro:false} mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x8) pread64(r0, &(0x7f0000006000)="", 0x0, 0x0) getpgid(0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000618000-0x4)={0xffffffffffffff9c}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00004e2000-0x8)={0x0, 0x4000000000000}, &(0x7f00009c8000-0x4)=0x8) mknod(&(0x7f00001c2000)="2e2f66696c653000", 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)="2e2f66696c653000", &(0x7f000089d000)=[], &(0x7f0000030000)=[&(0x7f000085c000-0x5a)="757365725d2a6d696d655f747970656d643573756d7b5d7472757374656473656c696e757816267573657273656375726974792c2476626f786e657431262b5b47504c76626f786e6574316d643573756dcf6574683047504c00", &(0x7f000015f000-0x6)="6c6f676f6e00", &(0x7f000021a000-0xc)="656d31736563757269747900", &(0x7f00004ea000)="6370757365747d252500", &(0x7f0000e0b000-0x10)="2f6465762f73657175656e6365723200", &(0x7f000019f000)="217b00", &(0x7f0000d8c000)="656d315b2c00", &(0x7f000072c000)="4073656375726974792d00", &(0x7f0000ffe000)="00"]) pipe2(&(0x7f0000c42000)={0x0, 0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000e04000-0x8)="73797363616c6c00") splice(r3, 0x0, r2, 0x0, 0xa3ea, 0x0)